Enumerate in brief about the intranet security policy, Computer Engineering

Assignment Help:

Enumerate in brief about the Intranet security policy

An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situation to situation, there are some general principles that can be found similar in almost all policies. Some of them are as follows:

  • Identification of
  • The content, and needs to be secured
  • User groups or categories
  • Procedures
  • Access authorisation procedure
  • Backup procedures
  • Disaster recovery procedures
  • Action against misuse
  • Course of action in the event of misuse or attacks
  • Ensuring employees exercise proper etiquette so that they do not misrepresent the company
  • Handling sensitive or secured documents stored on the intranet site
  • Copyright policies for intellectual properties developed by the company.

 


Related Discussions:- Enumerate in brief about the intranet security policy

Write a short note on pointer declaration, Write a short note on pointer de...

Write a short note on pointer declaration A simple variable in a program is stored in a certain number of bytes at a particular memory location, or address, in the machine. Poi

Explain standard streams and file streams, a. Explain Standard Streams and ...

a. Explain Standard Streams and file streams. Differentiate among two types of stream. b. Write a program in C++ that inputs characters from the keyboard and prints them in reve

Build and fix model, Why Build and fix model is considered as ad-hoc softwa...

Why Build and fix model is considered as ad-hoc software development model?

Information system and information technology, (a) Explain the following te...

(a) Explain the following terms: Information System and Information Technology. (b) Describe the main components of a computer. Illustrate your answer by a block diagram. (c)

De morgans laws, De Morgan's Laws : With continuing the relationship b...

De Morgan's Laws : With continuing the relationship between ^ and ? , we can also needs De Morgan's Law to rearrange sentences involving negation in conjunction with these con

Define cloud services with example, Define Cloud services with example. ...

Define Cloud services with example. Any web-based application or service offered by cloud computing is known as a cloud service. Cloud services can contain anything from calend

When should we stop testing, When should you stop testing? It is quite ...

When should you stop testing? It is quite complex to determine as many modern software applications are so complex and run in like an interdependent environment that complete t

Explain the major consideration of laptop computers, Explain the major cons...

Explain the major consideration of laptop One of the major considerations when buying a laptop is battery life. This can rely on a number of things though one major factor is p

Cognitive science applications, This branch of AI is concerned with incor...

This branch of AI is concerned with incorporating knowledge from varied disciplines such as biolog neurology psychology mathematics and several linked disciplines. It is typic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd